Open Access   Article Go Back

An Efficient and Secure Steganography Technique Using Edge Adaptive Technique

Neha Singla1 , Khushil Kumar Saini2

  1. Division of Computer Engineering, Netaji Subhas Institute of Technology, University of Delhi, New Delhi, India.
  2. Division of Computer Engineering, Netaji Subhas Institute of Technology, University of Delhi, New Delhi, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 766-772, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.766772

Online published on May 31, 2018

Copyright © Neha Singla, Khushil Kumar Saini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Neha Singla, Khushil Kumar Saini, “An Efficient and Secure Steganography Technique Using Edge Adaptive Technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.766-772, 2018.

MLA Style Citation: Neha Singla, Khushil Kumar Saini "An Efficient and Secure Steganography Technique Using Edge Adaptive Technique." International Journal of Computer Sciences and Engineering 6.5 (2018): 766-772.

APA Style Citation: Neha Singla, Khushil Kumar Saini, (2018). An Efficient and Secure Steganography Technique Using Edge Adaptive Technique. International Journal of Computer Sciences and Engineering, 6(5), 766-772.

BibTex Style Citation:
@article{Singla_2018,
author = {Neha Singla, Khushil Kumar Saini},
title = {An Efficient and Secure Steganography Technique Using Edge Adaptive Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {766-772},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2059},
doi = {https://doi.org/10.26438/ijcse/v6i5.766772}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.766772}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2059
TI - An Efficient and Secure Steganography Technique Using Edge Adaptive Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Neha Singla, Khushil Kumar Saini
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 766-772
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
528 228 downloads 213 downloads
  
  
           

Abstract

This paper presents an edge based embedding technique to achieve undetectability in steganography with minimal amount of distortion. In this method, desired information is embedded in the edges, as the edges are least susceptible to Human Visual System (HVS) and therefore, remains concealed. Further, the proposed technique uses Majority Parity Check to improve the PSNR of image. The prominent issue with steganography is the amount of distortion caused due to embedding. The proposed technique offers the flexibility of attaining high security with minimal distortion. Experimental results show that the technique provides reduction in the distortion by 20% in comparison to other well-known techniques available in literature.

Key-Words / Index Term

Steganography, Edge Adaptive, LSB, Majority Parity Check

References

[1] R. Agrawal, "Hippocratic Databases", In the Proceedings of the 28th International conference on Very Large Data Bases, VLDB Endowment, 2002.
[2] W. Luo, F. Huang, J. Huang, "Edge adaptive image steganography based on LSB matching revisited", IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 201-214, June 2010.
[3] S. Islam, P. Gupta, "Revisiting least two significant bits steganography", In the Proceedings of 8th International conference on intelligent information processing (ICIIP), Seoul, Republic of Korea, pp. 90-93, April 2013.
[4] A. Ker, “Steganalysis of embedding in two least-significant bits”, IEEE Transactions on Information Forensics and Security, pp. 46-54, April 2007.
[5] H. Al-Dmour, N. Ali, A. Al-Ani, "An efficient hybrid steganography method based on edge adaptive and tree based parity check", In the Proceedings of 21st International Conference, MMM 2015, Sydney, NSW, Australia, January 2015,
[6] H. Al-Dmour, A. Al-Ani, “A steganography embedding method based on edge identification and XOR coding”, Expert Systems With Applications, Vol/ 46, pp. 293-306, March 2016.
[7] W. Da-Chun, W. H. Tsai, “Steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, Vol. 24, Issues 9–10, pp. 1613-1626, June 2003.
[8] X. Zhang, S. Wang, “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security”, Pattern Recognition Letters, Vol 25, Issue 3, pp. 331-339, Feb 2004.
[9] N. Kanopoulos, N. Vasanthavada R. L., “Design of an image edge detection filter using the Sobel operator”, IEEE Journal of Solid-State Circuits, Vol. 23 , Issue 2, pp. 358-367, Apr 1988.
[10] A. Seif, M. M. Salut, M. N. Marsono, “A hardware architecture of Prewitt edge detection”, In the Proceedings of IEEE Conference on Sustainable Utilization and Development in Engineering and Technology”, pp. 99 – 101, Nov. 2010.
[11] L. Chen, I. W. Tsang, D. Xu, “Laplacian Embedded Regression for Scalable Manifold Regularization”, IEEE Transactions on Neural Networks and Learning Systems, Vol. 23, Issue: 6, pp. 902 – 915, June 2012.
[12] J. Canny, “A Computational Approach to Edge Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence”, Vol. PAMI-8 , Issue 6, pp. 679 – 698, Nov. 1986.
[13] K. More, J. Rao, "Hiding Data in Images with Least Distortion using Majority Vote Parity Check.", In the Proceedings of Third International Conference on Computational Intelligence and Information Technology – CIIT 2013, Mumbai, India, Oct. 2013.
[14] Hou, Chung-Li, et al, "An optimal data hiding scheme with tree-based parity check", Image Processing, IEEE Transactions on Image Processing, Vol. 20, Issue 3, p. 880-886, March 2011.